https://bugzilla.suse.com/show_bug.cgi?id=1232040 Bug ID: 1232040 Summary: VUL-0: CVE-2024-9050: NetworkManager-libreswan: improper sanitization of the VPN configuration of a local unprivileged user can lead to local privilege escalation via the leftupdown key Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.6 Hardware: Other URL: https://smash.suse.de/issue/425285/ OS: Other Status: NEW Severity: Major Priority: P5 - None Component: Security Assignee: dimstar@opensuse.org Reporter: smash_bz@suse.de QA Contact: security-team@suse.de CC: camila.matos@suse.com Target Milestone: --- Found By: Security Response Team Blocker: --- A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the `leftupdown`key. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system's network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-9050 https://bugzilla.redhat.com/show_bug.cgi?id=2313828 https://www.cve.org/CVERecord?id=CVE-2024-9050 https://access.redhat.com/security/cve/CVE-2024-9050 https://access.redhat.com/errata/RHSA-2024:8312 -- You are receiving this mail because: You are on the CC list for the bug.